Author of the publication

A randomised Kaczmarz method-based matrix completion algorithm for data collection in wireless sensor networks.

, , , , and . Int. J. Embed. Syst., 11 (4): 440-451 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling on virtual network embedding using reinforcement learning., , , , , , , and . Concurr. Comput. Pract. Exp., (2020)EMAP: An efficient mutual authentication protocol for passive RFID tags., , , and . Int. J. Autom. Comput., 9 (1): 108-112 (2012)On-line Calibration of Semiconductor Gas Sensors Based on Prediction Model., , , , , and . J. Comput., 8 (9): 2204-2208 (2013)A DPSO-Based Load Balancing Virtual Network Embedding Algorithm with Particle Initialization Strategy., , , , and . ICSI (2), volume 9713 of Lecture Notes in Computer Science, page 306-313. Springer, (2016)A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks., , , , and . KES-AMSTA, volume 4953 of Lecture Notes in Computer Science, page 584-593. Springer, (2008)Differential Kullback-Leibler Divergence Based Anomaly Detection Scheme in Sensor Networks., and . CIT, page 966-970. IEEE Computer Society, (2012)Secure Multiple Deployment in Wireless Sensor Networks., , and . MobiQuitous, page 1-4. IEEE Computer Society, (2007)Application on Information Island with Information Visualization and Software Engineering., , , , and . ICSAI, page 598-603. IEEE, (2018)Mutual Authentication in Wireless Mesh Networks., , , and . ICC, page 1690-1694. IEEE, (2008)A sequential mesh test based selective forwarding attack detection scheme in wireless sensor networks., , and . ICNSC, page 554-558. IEEE, (2010)